​
DirectorySecurity Advisories
Sign In
Security Advisories

CGA-g7rx-jxr6-8xc6

Published

Last updated

https://images.chainguard.dev/security/CGA-g7rx-jxr6-8xc6
Package

runc

Latest Update
Not affected
Aliases
  • CVE-2023-25809
  • GHSA-m8cg-xc2p-r3fc

Severity

2.5

Low

CVSS V3

Summary

rootless: /sys/fs/cgroup is writable when cgroupns isn't unshared in runc

Description

Impact

It was found that rootless runc makes /sys/fs/cgroup writable in following conditons:

  1. when runc is executed inside the user namespace, and the config.json does not specify the cgroup namespace to be unshared (e.g.., (docker|podman|nerdctl) run --cgroupns=host, with Rootless Docker/Podman/nerdctl)
  2. or, when runc is executed outside the user namespace, and /sys is mounted with rbind, ro (e.g., runc spec --rootless; this condition is very rare)

A container may gain the write access to user-owned cgroup hierarchy /sys/fs/cgroup/user.slice/... on the host . Other users's cgroup hierarchies are not affected.

Patches

v1.1.5 (planned)

Workarounds

  • Condition 1: Unshare the cgroup namespace ((docker|podman|nerdctl) run --cgroupns=private). This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts.
  • Condition 2 (very rare): add /sys/fs/cgroup to maskedPaths

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images